Email is critical to an organization. Phishing provides a way for cyber criminals to use email as a disguise to try to sneak by and steal business data.
There are only so many ways to break into a bank. You can march through the door. You can climb through a window. You can tunnel through the floor.
There is the service entrance, the employee entrance, and access on the roof.
Criminals who want to rob a bank will probably use an open route – such as a side door. It’s easier than breaking down a wall.
Cyber criminals who want to break into your computer network face a similar challenge. They need to enter. They can look for a weakness in your network – maybe a vulnerability in your server – but it’s easier for them to use an open route. Email is one of their favorites.
Email is a door into your computer network. Data passes through it every day. If criminals want to break in, some will throw on a disguise and try to sneak by.
By pretending to be someone else, such as someone you respect, they will try to earn enough of your trust to steal from you.
This is called phishing. (more…)